Changes

Jump to navigation Jump to search
Line 13: Line 13:  
* The possibility of introducing a virus attack
 
* The possibility of introducing a virus attack
 
* The development of a legitimate website copy
 
* The development of a legitimate website copy
 +
* Session Hijacking
 
* Via instant messaging
 
* Via instant messaging
 
* Fooling Internet users to submit financial and personal data or passwords
 
* Fooling Internet users to submit financial and personal data or passwords
 
* Emails that claim to be sent on behalf of well-known organizations  
 
* Emails that claim to be sent on behalf of well-known organizations  
 +
* Data Theft
 +
* DNS-Based Phishing also referred to as "Pharming" <ref>[http://pcworld.about.com/od/emailsecurity/Types-of-Phishing-Attacks.htm Phishing types]</ref>
 
* Voice phishing, which is a rather new form of phishing: users will receive an email allegedly from their favorite websites and will be requested to call a fraudulent number and update their information, which will then be stolen by the hacker.<ref>[http://www.spamlaws.com/voice-and-spear-phishing.html Voice phishing]</ref>
 
* Voice phishing, which is a rather new form of phishing: users will receive an email allegedly from their favorite websites and will be requested to call a fraudulent number and update their information, which will then be stolen by the hacker.<ref>[http://www.spamlaws.com/voice-and-spear-phishing.html Voice phishing]</ref>
* Tabnabbing, which takes advantage of multiple tabs which Internet users may frequently use and redirects the Internet user to the wrong website.
+
* Tabnabbing, which takes advantage of multiple tabs which Internet users may frequently use and redirects the Internet user to the wrong website. <ref>[http://www.crustiz.com/web-2-0/tabnagging-new-phishing-attack/ Tabnagging]</ref>
* Pop-up windows which may appear from legitimate and original websites but request financial and credential information.  
+
* Pop-up windows which may appear from legitimate and original websites but request financial and credential information.
    
==Protection against phishing practices==
 
==Protection against phishing practices==
804

edits

Navigation menu